| version 1.3, 2007/01/30 04:59:55 |
version 1.21, 2008/09/19 03:08:01 |
|
|
| # Before `make install' is performed this script should be runnable with |
#!/usr/bin/perl -T |
| # `make test'. After `make install' it should work as `perl test.pl' |
# $RedRiver: keyring.t,v 1.20 2008/09/18 06:06:11 andrew Exp $ |
| |
use strict; |
| |
use warnings; |
| |
|
| ######################### We start with some black magic to print on failure. |
use Test::More tests => 194; |
| |
use Data::Dumper; |
| |
|
| # Change 1..1 below to 1..last_test_to_print . |
BEGIN { |
| # (It may become useful if the test is moved to ./t subdirectory.) |
use_ok('Palm::PDB'); |
| |
use_ok('Palm::Keyring'); |
| |
} |
| |
|
| my $test = 1; |
my $file = 'Keys-test.pdb'; |
| BEGIN { $| = 1; print "1..12\n"; } |
my $password = '12345'; |
| END {print "not ok $test\n" unless $loaded;} |
my $new_password = '54321'; |
| use Palm::PDB; |
|
| use Palm::Keyring; |
|
| $loaded = 1; |
|
| print "ok $test\n"; |
|
| $test++; |
|
| |
|
| ######################### End of black magic. |
my @o = ( |
| |
{ version => 4, |
| |
password => $password, |
| |
}, |
| |
{ version => 5, |
| |
password => $password, |
| |
cipher => 1, |
| |
}, |
| |
); |
| |
|
| # Insert your test code below (better if it prints "ok 13" |
|
| # (correspondingly "not ok 13") depending on the success of chunk 13 |
|
| # of the test code): |
|
| |
|
| my $file = 'Keys-GTKR-test.pdb'; |
|
| my $password = '12345'; |
|
| my $new_password = '54321'; |
|
| my $acct = { |
my $acct = { |
| name => 'test3', |
0 => { |
| account => 'atestaccount', |
label => 'name', |
| password => $password, |
label_id => 0, |
| notes => 'now that really roxorZ!', |
data => 'test3', |
| |
font => 0, |
| |
}, |
| |
1 => { |
| |
label => 'account', |
| |
label_id => 1, |
| |
data => 'atestaccount', |
| |
font => 0, |
| |
}, |
| |
2 => { |
| |
label => 'password', |
| |
label_id => 2, |
| |
data => $password, |
| |
font => 0, |
| |
}, |
| |
3 => { |
| |
label => 'lastchange', |
| |
label_id => 3, |
| |
data => { |
| |
day => 2, |
| |
month => 2, |
| |
year => 99, |
| |
}, |
| |
font => 0, |
| |
}, |
| |
255 => { |
| |
label => 'notes', |
| |
label_id => 255, |
| |
data => 'now that really roxorZ!', |
| |
font => 0, |
| |
}, |
| }; |
}; |
| |
|
| |
my $bad_cipher = 999; |
| |
my %crypt_1_details = ( |
| |
'default_iter' => 1000, |
| |
'keylen' => 24, |
| |
'blocksize' => 8, |
| |
'name' => 'DES_EDE3', |
| |
'alias' => 'DES-EDE3', |
| |
'DES_odd_parity' => 1 |
| |
); |
| |
|
| |
my $bad_label = 999; |
| |
my $bad_label_name = 'not_a_label_name'; |
| |
my %label_1_details = ( |
| |
id => 1, |
| |
name => 'account', |
| |
); |
| |
my %label_not_found_details = ( |
| |
id => $bad_label, |
| |
name => undef, |
| |
); |
| |
|
| |
# Crypts |
| |
is_deeply( Palm::Keyring::crypts(1), \%crypt_1_details, 'Got crypt 1' ); |
| |
is_deeply( Palm::Keyring::crypts('DES-EDE3'), |
| |
\%crypt_1_details, 'Got crypt DES-EDE3' ); |
| |
is( Palm::Keyring::crypts(), undef, "Didn't get crypt empty cipher" ); |
| |
is( Palm::Keyring::crypts($bad_cipher), |
| |
undef, "Didn't get crypt $bad_cipher" ); |
| |
|
| |
# Bad Cipher |
| |
eval { Palm::Keyring->new( { version => 5, cipher => $bad_cipher } ) }; |
| |
like( |
| |
$@, |
| |
qr/^Unknown \s cipher \s $bad_cipher/xms, |
| |
"Failed to create keyring with cipher $bad_cipher" |
| |
); |
| |
|
| |
# Labels |
| |
is_deeply( Palm::Keyring::labels(1), \%label_1_details, 'Got label 1' ); |
| |
is_deeply( Palm::Keyring::labels('account'), |
| |
\%label_1_details, 'Got label account' ); |
| |
is( Palm::Keyring::labels(), undef, "Didn't get label empty label" ); |
| |
is_deeply( Palm::Keyring::labels($bad_label), |
| |
\%label_not_found_details, "Got default label for $bad_label" ); |
| |
is( Palm::Keyring::labels($bad_label_name), undef, "Didn't get label for $bad_label_name" |
| |
); |
| |
|
| |
|
| |
|
| my $pdb; |
my $pdb; |
| |
|
| |
eval { $pdb = new Palm::Keyring( -file => 't/Keys-invalid_version.pdb' ) }; |
| |
like( |
| |
$@, |
| |
qr/^Unsupported \s Version \s 999/xms, |
| |
'Couldn\'t load pdb with invalid version' |
| |
); |
| |
|
| |
eval { $pdb = new Palm::Keyring( -file => 't/Keys-invalid_cipher.pdb' ) }; |
| |
like( |
| |
$@, |
| |
qr/^Unknown \s cipher \s 999/xms, |
| |
'Couldn\'t load pdb with Unknown Cipher' |
| |
); |
| |
|
| |
ok( $pdb = new Palm::Keyring( -file => 't/Keys-no_data.pdb' ), |
| |
'Loaded Palm::Keyring file with no data' ); |
| |
|
| |
ok( $pdb->Password($password), 'Entering Password' ); |
| |
|
| my $record; |
my $record; |
| |
ok( $record = $pdb->append_Record(), 'Append Record' ); |
| |
ok( $pdb->Encrypt( $record, $password, $acct ), |
| |
'Encrypt account into record' ); |
| |
ok( $pdb->PackRecord($record), 'Pack Proper Record'); |
| |
ok( $record = $pdb->ParseRecord(%{ $record }), 'Parse Proper Packed'); |
| |
|
| eval { $pdb = new Palm::Keyring($password) }; |
my $record2; |
| unless( $@ ) { |
ok( $record2 = $pdb->append_Record(), 'Append Record' ); |
| print "ok $test\n"; |
ok( $pdb->PackRecord($record2), 'Pack Empty Record'); |
| } else { |
ok( $record = $pdb->ParseRecord(%{ $record2 }), 'Parse Empty Packed'); |
| print "not ok $test\n"; |
|
| } |
|
| $test++; |
|
| |
|
| eval { $record = $pdb->append_Record() }; |
|
| unless( $@ ) { |
|
| print "ok $test\n"; |
|
| } else { |
|
| print "not ok $test\n"; |
|
| } |
|
| $test++; |
|
| |
|
| eval { $pdb->Encrypt($record, $acct, $password) || die }; |
$pdb->{version} = 999; |
| unless( $@ ) { |
eval{ $pdb->PackRecord($record) }; |
| print "ok $test\n"; |
like( $@, |
| } else { |
qr/^Unsupported \s Version \s 999/xms, |
| print "not ok $test\n"; |
'Couldn\'t PackRecord with Invalid Version' |
| } |
); |
| $test++; |
|
| |
|
| |
eval{ $pdb->ParseRecord(%{ $record2 }) }; |
| |
like( $@, |
| |
qr/^Unsupported \s Version \s 999/xms, |
| |
'Couldn\'t ParseRecord with Invalid Version' |
| |
); |
| |
|
| eval { $pdb->Write($file) }; |
eval { $pdb->Write($file) }; |
| unless( $@ ) { |
like( |
| print "ok $test\n"; |
$@, |
| } else { |
qr/^Unsupported \s Version \s 999/xms, |
| print "not ok $test\n"; |
'Couldn\'t Write file with unsupported version' |
| } |
); |
| $test++; |
|
| |
|
| $pdb = new Palm::PDB; |
|
| $acct = {}; |
|
| |
|
| eval { $pdb->Load($file) }; |
$pdb = undef; |
| unless( $@ ) { |
|
| print "ok $test\n"; |
|
| } else { |
|
| print "not ok $test\n"; |
|
| } |
|
| $test++; |
|
| |
|
| eval { $pdb->Password($password) || die }; |
unlink $file; |
| unless( $@ ) { |
|
| print "ok $test\n"; |
|
| } else { |
|
| print "not ok $test\n"; |
|
| } |
|
| $test++; |
|
| |
|
| eval { $acct = $pdb->Decrypt($pdb->{'records'}->[1]) || die }; |
foreach my $options (@o) { |
| unless( $@ ) { |
foreach my $config_type ( 'hashref', 'cgi-style', 'list' ) { |
| print "ok $test\n"; |
|
| } else { |
|
| print "not ok $test\n"; |
|
| } |
|
| $test++; |
|
| |
|
| if ($acct->{'password'} eq $password) { |
my $pdb; |
| print "ok $test\n"; |
my $record; |
| } else { |
my $decrypted; |
| print "not ok $test\n"; |
|
| } |
|
| $test++; |
|
| |
|
| eval { $pdb->Password($password, $new_password) || die }; |
my $Num_Tests_Left = 25; |
| unless( $@ ) { |
SKIP: { |
| print "ok $test\n"; |
if ( defined $options->{cipher} && $options->{cipher} > 0 ) { |
| } else { |
my $crypt = Palm::Keyring::crypts( $options->{cipher} ); |
| print "not ok $test\n"; |
skip 'Crypt::CBC not installed', $Num_Tests_Left |
| } |
unless eval "require Crypt::CBC"; |
| $test++; |
if ($crypt) { |
| |
skip 'Crypt::' . $crypt->{name} . ' not installed', |
| |
$Num_Tests_Left |
| |
unless eval "require Crypt::$crypt->{name}"; |
| |
} |
| |
else { |
| |
skip 'Unknown Crypt: ' . $options->{cipher}, |
| |
$Num_Tests_Left; |
| |
} |
| |
} |
| |
|
| $acct = {}; |
if ( $options->{version} == 4 ) { |
| eval { $acct = $pdb->Decrypt($pdb->{'records'}->[1]) || die }; |
skip 'Crypt::DES not installed', $Num_Tests_Left |
| unless( $@ ) { |
unless eval "require Crypt::DES "; |
| print "ok $test\n"; |
skip 'Digest::MD5 not installed', $Num_Tests_Left |
| } else { |
unless eval "require Digest::MD5 "; |
| print "not ok $test\n"; |
} |
| } |
elsif ( $options->{version} == 5 ) { |
| $test++; |
skip 'Digest::HMAC_SHA1 not installed', $Num_Tests_Left |
| |
unless eval "require Digest::HMAC_SHA1 "; |
| |
} |
| |
|
| if ($acct->{'password'} eq $password) { |
my @options = ($options); |
| print "ok $test\n"; |
if ( $config_type eq 'cgi-style' ) { |
| } else { |
@options = ( |
| print "not ok $test\n"; |
'-version' => $options->{version}, |
| |
'-password' => $options->{password}, |
| |
); |
| |
if ( $options->{cipher} ) { |
| |
push @options, '-cipher', $options->{cipher}; |
| |
} |
| |
} |
| |
elsif ( $config_type eq 'list' ) { |
| |
@options = ( $options->{password}, $options->{version} ); |
| |
if ( $options->{cipher} ) { |
| |
push @options, $options->{cipher}; |
| |
} |
| |
} |
| |
|
| |
ok( $pdb = new Palm::Keyring(@options), |
| |
'new Palm::Keyring v' . $options->{version} |
| |
); |
| |
|
| |
ok( $pdb->Write($file), 'Write "empty" file' ); |
| |
|
| |
ok( $record = $pdb->append_Record(), 'Append Record' ); |
| |
|
| |
ok( $pdb->Encrypt( $record, $password, $acct ), |
| |
'Encrypt account into record' ); |
| |
|
| |
ok( $pdb->Write($file), 'Write file' ); |
| |
|
| |
$pdb = undef; |
| |
|
| |
ok( $pdb = new Palm::Keyring(), 'new Palm::Keyring' ); |
| |
|
| |
ok( $pdb->Load($file), 'Load File' ); |
| |
|
| |
ok( $pdb->Password($password), 'Verify Password' ); |
| |
|
| |
my $rec_num = 0; |
| |
ok( $decrypted = $pdb->Decrypt( $pdb->{records}->[$rec_num] ), |
| |
'Decrypt record' ); |
| |
|
| |
is( $decrypted->{2}->{data}, $password, 'Got password' ); |
| |
|
| |
is_deeply( $decrypted, $acct, 'Account Matches' ); |
| |
|
| |
my $old_date = $decrypted->{3}->{data}; |
| |
|
| |
ok( $pdb->Password( $password, $new_password ), |
| |
'Change PDB Password' ); |
| |
|
| |
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
| |
'Decrypt with new password' ); |
| |
|
| |
my $new_date = $decrypted->{3}->{data}; |
| |
|
| |
is_deeply( $old_date, $new_date, 'Date didn\'t change' ); |
| |
|
| |
$decrypted->{2}->{data} = $new_password; |
| |
|
| |
$pdb->{records}->[$rec_num]->{plaintext} = $decrypted; |
| |
|
| |
ok( $pdb->Encrypt( $pdb->{'records'}->[$rec_num] ), |
| |
'Change record' ); |
| |
|
| |
ok( $decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ), |
| |
'Decrypt new record' ); |
| |
|
| |
$new_date = $decrypted->{3}->{data}; |
| |
|
| |
my $od = join '/', map { $old_date->{$_} } sort keys %{$old_date}; |
| |
my $nd = join '/', map { $new_date->{$_} } sort keys %{$new_date}; |
| |
|
| |
isnt( $od, $nd, 'Date changed' ); |
| |
|
| |
is( $decrypted->{2}->{data}, $new_password, 'Got new password' ); |
| |
|
| |
my $last_decrypted = $decrypted; |
| |
|
| |
$decrypted = {}; |
| |
ok( $pdb->Password(), 'Forget password' ); |
| |
|
| |
eval { |
| |
$decrypted = $pdb->Decrypt( $pdb->{'records'}->[$rec_num] ); |
| |
}; |
| |
ok( $@, 'Don\'t decrypt' ); |
| |
|
| |
isnt( $decrypted->{password}, |
| |
$new_password, 'Didn\'t get new password' ); |
| |
|
| |
ok( $pdb->Unlock($new_password), 'Unlock' ); |
| |
|
| |
my @plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
| |
|
| |
is_deeply( $plaintext[0], $last_decrypted, 'Account Matches' ); |
| |
|
| |
ok( $pdb->Lock(), 'Lock' ); |
| |
|
| |
my $cleared_decrypted = {}; |
| |
$cleared_decrypted->{0} = $last_decrypted->{0}; |
| |
@plaintext = map { $_->{plaintext} } @{ $pdb->{records} }; |
| |
|
| |
is_deeply( $plaintext[0], $cleared_decrypted, 'Cleared records' ); |
| |
|
| |
$pdb->{records}->[0]->{data} = undef; |
| |
ok( $pdb->Write($file), 'Write file without data' ); |
| |
ok( $pdb->Load($file), 'Load File without data' ); |
| |
|
| |
ok( unlink($file), 'Remove test pdb v' . $options->{version} ); |
| |
|
| |
} |
| |
} |
| } |
} |
| $test++; |
|
| unlink($file); |
|
| |
|
| 1; |
1; |
| |
|